pwnedlabs 25
- Reveal Hidden Files in Google Storage
- Pivot Through Service Accounts using Dangerous Permissions
- Leverage Google Workspace for GCP Resource Access
- Impersonate GCP Service Account for Privileged Access
- Illuminate GCP by Fuzzing IAM Permissions
- Gain Entry to GCP via GitLab Commit
- Exploit SSRF with Gopher for GCP Initial Access
- Unlock Access with Azure Key Vault
- Loot Exchange, Teams and SharePoint with GraphRunner
- Azure Recon to Foothold and Profit
- Azure Blob Container to Initial Access
- Unauthenticated AWS IAM Principals Enumeration
- SSRF to Pwned
- Prevent Breaches with AWS IAM Access Analyzer
- Loot Public EBS Snapshots
- Intro to AWS IAM Enumeration
- AWS S3 Enumeration Basics
- Identify IAM Breaches with CloudTrail and Athena
- Hunt for Secrets in Git Repos
- Exploit Jenkins in the Cloud
- Escalate Privileges by IAM Policy Rollback
- Bypass Restrictions in API Gateway
- AWS S3 Enumeration Basics
- Assume Privileged Role with External ID
- Abuse OpenID Connect and GitLab for AWS Access